In public key encryption for authentication, the supplicant uses ________ to encrypt.

the supplicant's private key
the supplicant's public key
the verifier's private key
the verifier's public key


the supplicant's private key

Computer Science & Information Technology

You might also like to view...

The table marked 1 in the accompanying figure has a frame value of "border."

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Which of the following firewalls allows an administrator to specify what applications are allowed access?

a. Packet filter firewalls b. Router firewalls c. Stateful inspection firewalls d. Application gateway firewalls

Computer Science & Information Technology

A cold site provides many of the same services and options of a hot site, but at a lower cost.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Which of the following allows a server to request a website on behalf of Jane, a user?

A. Sniffers B. Proxies C. Load balancers D. Firewall

Computer Science & Information Technology